Help Desk Tips: How to Organize Your Desktop With Folders

At LEAP Managed IT, our helpdesk is more than just a robot — it’s a team of people who generally work together on behalf of your company to help you get a win. This is why it is important for us to provide the resources you need!

Indianapolis Help Desk Tip Experts: How to Make a Desktop Folder

Indianapolis help desk experts at LEAP Managed IT know that being organized in business is the key to success. From schedules to expense reports, organization is what makes or breaks a business. If your business is not properly organized, you can lose valuable time, paperwork, balance, and structure. But this doesn’t just apply to the physical files on your desk. How often, if at all, do you organize your computer desktop?

According to a 2020 poll conducted by Western Digital, the average American hasn’t cleaned or organized their digital desktops in over two years! On top of that, 62% of recipients [out of 2,000 Americans] say their digital desktops are “very cluttered” across all devices.

Indianapolis Help Desk Experts at LEAP Managed IT are here to help! Here are tips to help make your desktop organized. Start with creating desktop folders.

With Windows
CTRL + Shift + N

  1. Navigate to the locations in which you want to have a folder. This can be on your desktop or to create a subfolder. After you have navigated to where you want the folder to be created, press the keys CTRL, Shift, and N on your keyboard. This will immediately create a folder.
  2. The folder created will default to the name “New Folder.” Immediately after the folder is created, you have the ability to just start typing. Type whatever you want to name your folder. If you mess up or want to rename it, right click the folder and click on “Rename.”

For MacOS
Again, our Indianapolis Help Desk experts share a few different methods.

  1. File Menu – Go to your desktop. At the top navigation bar, it has an a assortment of words. Next to the bolded “Finder” is “File.” Click “File” and click “New Folder.”
  2. An “Untitled Folder” appears on your desktop on a default location. The name of the folder is highlighted, you can start typing the name in which you would like to name the folder. If you mess up or would like to rename the folder, you can Right-Click (if you have a mouse) or click with two fingers on the trackpad. A menu will appear and click the option “Rename.”
  3. You can then relocate the folder by simply dragging it around your desktop. If you would like it to be a subfolder, you can open the folder you would like it to be in, and drag it into the folder.
  4. Double Click (or Right-Click)

Another Indianapolis Help Desk Mac Tip:
Command + Shift + N – This is the same concept as the Windows keyboard shortcut.

  1. Navigate to the locations in which you want to have a folder. This can be on your desktop or to create a subfolder.
  2. After you have navigated to where you want the folder to be created, press the keys Command, Shift and N on your keyboard. This will immediately create a folder.
  3. The folder created will default to the name “Untitled Folder.” Immediately after the folder is created, you have the ability to just start typing. Type whatever you want to name your folder. If you mess up or want to rename it, right click the folder and click on “Rename.”

LEAP Managed IT helps Indianapolis, Carmel, Westfield, Greenwood, and Zionsville area businesses with their IT solutions. Our goal is to be your ridiculously helpful IT advisor. Like us on Facebook for more tips or call our Indianapolis help desk!

 

Managed IT Support: Why Do You Need it for Your Indianapolis Business?

So why is Managed Support important? Try experiencing technical difficulties and having your whole system crash! Have you ever imagined the panic when you can’t retrieve anything? Well, don’t wait for something unfortunate to happen before realizing the importance.

One of the biggest turn-offs we experience in contacting helpdesks and break fix technicians is when, after spending so much time trying to get hold of anybody for help, there is none.

With LEAP Managed IT’s Master Plan, IT experts learn about your IT struggles and frustrations. They assess your network, devices, and security to make sure that everything is at its maximum potential to grow with your business.

Proactive Helpdesk

Managed Support Services is the practice of outsourcing IT Services for your business or organization. It is relying on a third party to anticipate the need, maintaining, improve operations, and more.

Why are Managed IT Support Services Important?
  1. IT experts give peace of mind – Since we all have limited IT knowledge, Managed Support takes care of your IT, especially when there is trouble like slow internet, data backup, and recovery and anything that concerns the technical side of business. Through this, you can focus on growing your business.
  2. Master Plan – LEAP Managed IT has a master plan that is tailored and aligned to the needs of your organization.
  3. Getting a Proactive Support – LEAP Managed IT offers proactive IT support. The IT team experts identify problem areas before they happen. In addition, you feel comfortable that in an emergency, they are there to solve your problems. Getting you back up and running again is a priority.
  4. Strategic IT Planning and Support– The IT experts will advise you on what you need in terms of technology and how it can help you run your business. This links to a proactive IT support, making sure that the infrastructure and all software are up to date to minimize risks, such as downtime, virus attacks, and system crashes.

Managed IT Support Indianapolis

For Managed Support Services in Indianapolis, contact leapmanagedit.com. Experience helpdesk and managed support that is far from frustrating. Let the IT experts worry about your IT infrastructure, and you concentrate on growing your business. For more about Helpdesk and Managed Support click here and see how LEAP Managed IT, managed it all.

Indianapolis Managed IT Experts Help Desk Tips: How to Protect Your Devices from Lightning Strikes and Power Surges

As an Indianapolis-based, ridiculously helpful IT company it’s our job to provide Help Desk Tips on every topic. LEAP Managed IT is all too familiar with the crazy Midwest weather. During the summer and fall months, the Midwest tends to get hit with intense storms, some of which result in damage.

Here at LEAP, we want to make sure our Indianapolis clients are aware of the effects lightning strikes and power surges can have on their electronics and the steps they can take to prevent future damage.

3 help desk tips to protect your business and electronics from intense lightning strikes and power surges.

UNPLUG

First and easiest of the help desk tips is the most efficient way to prevent damage to your electronics from lightning or power surges is to simply unplug your devices. Lightning strikes and power surges result in a spike of the electric current, sending too many volts of electricity to your electronics. Plugged in devices are vulnerable to damage from these spikes in electricity, putting you at risk for losing everything stored in the device. Our Help Desk Tip suggestion: regularly back up your files and unplug non-essential devices during storms.

SURGE PROTECTION

Second is the Surge! Surge protection can come in four different forms.

  • (Type 1) service entrance surge protectors
  • (Type 2) whole-house surge protectors
  • (Type 3) receptacle surge protectors
  • (Type 12) combination types.

Installing surge protection is a more expensive solution, but a necessary investment. It’s recommended that you have at least Type 2 protection; not just relying on the bare minimum or cheap surge protection plug-in strips.

HIRE AN ELECTRICIAN & GET INSURANCE

Third, have an electrician to survey and test your grounding system. Invest in lightning insurance if you aren’t already. Most fire insurance covers fire by lightning, but not always the damage. We suggest making sure your insurance covers lightning strike and power surge damage.

30-30 LIGHTNING RULE

Last of the Help Desk Tips is the 30-30 lightning rule. The easiest way to determine if lightning is in your area is to count the seconds between seeing the lightning and hearing the thunder. If it is less than 30 seconds, lightning is near. When the storm is over, wait 30 minutes after last hearing thunder to plug your devices back in.

For more help desk tips call our IT experts at LEAP Managed IT. We help businesses grow in Indianapolis, Carmel, Zionville, Greenwood, Muncie, and the tri-state area. Visit us today!

An EDR Checklist

Being a great IT partner means staying ahead of the curve, and knowing how to protect against a threat before it becomes an issue. As cyber crime grows, your IT provider stays at the forefront and helps protect you from threats. Do you have an efficient EDR in place? Do you even know what that acronym stands for or what it does for your company’s overall security?

Understanding the terms is not easy, and you don’t have to be an expert, but you do need to know how to protect yourself in case something happens.

So we’ll start there — EDR stands for, “endpoint detection and response.” It’s a security measure that combines real-time monitoring with a collection of data to ensure that all threats are caught in real time.

Your Company’s Security

When was the last time you checked in with your provider? If it has been over six months, it’s time to reach out and ask some vital questions.

In our efforts to continue being Ridiculously Helpful, we developed a Quick Safety Check!

Six EDR Checklist Questions:

First, here are some questions you should be asking yourself:

  1. Do you have EDR?
  2. Is multi-factor authentication, or MFA, part of your daily security?
  3. Have you or your team completed Cyber Threat Training?
    • Are you confident someone in your office won’t click on “that” link?
  4. Do you have Cyber Insurance Compliance?
  5. Have you done Cyber Penetration Testing?
  6. When was your last Risk Assessment?
    • Is it documented?

If you answer YES to all of these then you can sleep more soundly at night.

If you didn’t, call your IT provider. Or better yet, call us. We can help walk you though the process. First, we will help you understand what you need to know and why. Then we can help develop a plan to get you moving in the right direction.

Being the leader in IT and Managed services in Indianapolis takes work and dedication. Our trusted team of advisors can help you. It’s our job to be cyber security experts and make sure your business is protected. Reach out to us today!

Indianapolis Cyber Security Best Practices 2022

Another Year of the Virus?

The changes that have taken over our lives for the past two years have been challenging. 2020 was the year of the virus, they say, and then this continued into 2021. But, could this virus be both biological and digital? Could the solution to the latter of them be as simple as implementing better cyber security practices?

As COVID-19 continues to disrupt and threaten businesses, we continue to manage the aspects of the business that we can can control — sales, marketing and other internal services in order to maintain growth and continuity.

Along with these changes, comes IT. Due to the pandemic, most employees work from home. Banking, shopping, and almost all activities are done online. This is where cyber security best practices come in.

Cyber security is not limited only to those who run businesses. It is not only for organization leaders but for all of us. Those who rely on the internet for work, business, schooling, and everyday activities are all targets for cybercriminals. For businesses, the responsibility of protecting client information is vital. In addition, looking out for ourselves from scams and identity theft is important too.

So, how can a business avoid being a victim of a cyber attack? How can we personally protect our privacy online?

Here are Five Key Cyber Security Best Practices To Use as a Guide:

  1. Use a firewall as your first line of defense.
    A firewall provides a barrier between your data and cybercriminals. It also prevents unauthorized access to your network. In addition to the standard external firewall, many companies are starting to install internal firewalls to provide another level of protection.
  2. Educate your employees.
    Train all employees who are accessing the network about cybersecurity best practices and security policies. Since the policies are evolving as cybercriminals become more resourceful, it is essential to have regular updates on new protocols.
  3. Enforce safe password practices.
    Changing passwords from time to time can be a pain. However, Data Breach Investigations Report found that 63% of data breaches happened due to lost, stolen, or weak passwords. As a responsible business owner, strict password policies should be enforced for protection. Recommend that employees be required to use passwords with upper- and lowercase letters, combined with numbers and symbols. It is also best to require password change at least once every 60 days. Also, explore Two-Factor Authentication options.
  4. Take time to backup all data.
    While it is important to prevent as many attacks as possible, it is still possible to experience breaches regardless of your precaution. Be one step ahead, regularly backup all important data. Make sure that backups are stored in a separate location in case of flood or fire. It is also important to check your backup regularly to ensure that it is functioning correctly.
  5. Be vigilant for social engineering attacks.
    Because there is a rise in the volume of social media information, hackers can find ways to reach you through malware via phishing. Be careful about the emails and texts you receive and make sure they are not from those who pretend to be. Avoid opening suspicious files and give zero percent trust when it comes to social engineering threats.

Secure Cyber Management

Owning and running a business or organization, of any size can sometimes be frustrating. Aside from thinking of the sales, we have to realize our responsibility to our employees and customers. Preventing financial loss, disruption of daily activities, and keeping your reputation is achievable through secure cyber management.

This is where Managed IT Service becomes necessary. For more on cybersecurity best practices, remote work assistance, backup, and data security, visit Indianapolis IT Leader leapmanagedit.com today. Feel free to contact us, as we can be ridiculously helpful in all your struggles, IT and beyond.

Indianapolis Business Journal CFO of the Year

Indianapolis Business Journal CFO of the Year

LEAP Managed IT is a proud sponsor of the Indianapolis Business Journal CFO of the YEAR event! The event will take place at the Indianapolis Marriott (350 West Maryland Street, Indianapolis). The event starts at 8am on Thursday, the 9th of December.

Featured Speaker

Cynthia Lucchese
Chief Strategy Officer
Penske Entertainment

CFO of the Year Awards IBJ’s CFO of the Year honorees are impressive financial professionals who steer the fortunes of their companies and organizations.

We love recognizing talented individuals within our communities who make Indiana a better place to live and work. Interested in attending the December 9th event, Click here!

LEAP Managed IT helps Indianapolis businesses feel confident in their technology by helping them take control of IT support and IT service issues. Proud to be Indiana-based serving Indianapolis, Fishers, Carmel, Greenwood and Muncie.

More about us:

First, born out of a central Indiana based company, founded in 1930, LEAP Managed IT has a heritage in using technology to help organizations become more efficient and achieve their goals.

Secondly, we’re here to foster the one-on-one relationship you need to feel confident that your organization is secure and positioned for success.

Thus, we believe when people feel confident, supported and challenged, they feel empowered to do great things inside and outside the office.  Hence, is why we work hard to maintain a team culture that provides great experiences. Both for those who work for us and those who work with us.

Lastly, Service quality shouldn’t change based on the person who helps you. Our entire team strives for excellence, providing you a high level of service with each customer interaction. No matter the situation. Amazing things happen when we come together, which is why we serve as more than an IT handyman when your computer breaks down. We think of ourselves as your business partner. Someone you can turn to for assistance to help your organization grow. Additionally, we want to make goals happen.

 

Risk Management Webinar

Indianapolis Risk Management experts form the Thompson Group, join the  LEAP Managed IT Cyber Security team on October 26th!

First click to register! Then, join LEAP Managed IT along with experts from the The Thompson Group. During the event, we will discuss mitigating Cyber Security Risk and steps you can take to keep your organization protected.  The Leap Cyber Security Team will lead a roundtable discussion and discuss industry standards for risk coverage and protection.

Again, LEAP brings together Indianapolis experts and Ridiculously Helpful Tips! With this in mind, learn how to protect your business. Also, what coverage you need and how to mitigate your cyber security risk.

The Leap Cyber Security Team will lead a roundtable discussion and discuss industry standards for risk coverage and protection.

REGISTER HERE

Learn more about The Thompson Group and how they help organizations all over the United States with Risk Management.

Hence, want to learn more about LEAP Managed IT Services by Indianapolis Top IT Experts, visit leapmanagedit.com 

Clearly, we help Indianapolis businesses feel confident in their technology by helping them take control of IT support and IT service issues. Besides being a proud Indiana-based business, we serve Indianapolis, Fishers, Carmel, Greenwood and Muncie, Zionsville and the entire metro area.

Now, for a sample of our Ridiculously Helpful Services from our experts:

  • End Point Detection and Response (EDR)
  • Multi Factor Implementation (MFA)
  • Cyber Threat Training
  • Cyber Insurance Compliance
  • Penetration Testing
  • Security Risk Assessments
  • Indianapolis Cyber Security Experts

Above all, don’t forget to register today. Definitely you don’t want to miss this event. Especially since space is limited.

IBJ & LEAP Technology and Cybersecurity Roundtable Series

Technology and Cybersecurity

Technology and Cybersecurity are the topic of IBJ’s most recent edition of the Thought Leadership Roundtable.  Undoubtedly, the roundtable features the top Indianapolis tech leaders.

Now, let’s share the first question in the series, to learn more and continue reading the entire feature visit the Indianapolis Business Journal.

Let’s start with a discussion of cybersecurity. Every day there seems to be news of a data breach. What are organizations doing wrong and how can they protect themselves?

Jim Goldman:

 I think it’s less about what organizations are doing wrong, and more about not doing enough. The current approach to cyberrisk management is broken, particularly for small- to medium-sized businesses. It’s easy to get caught up in buying what appears to be the next big cybersecurity tool. But a random collection of security tools does not a cybersecurity program make. Today’s cyberrisk management must involve a comprehensive integrated strategy that first includes understanding your risk with regular vulnerability assessments, then mitigating risk by repairing the most severe areas of vulnerability, and finally, transferring residual risk with cyber insurance. Most companies are not considering all three parts of the strategy. Companies can take some very manageable first steps to protect their data, but the most important first step is knowing where your systems are weak.

Sean Hendrix:

The starting point is awareness. This is where the concept of “zero trust” comes into play. As a business community, we tend to default to a condition where we trust the networks we are using. If we, as business leaders, buy in to the idea of zero trust, we will drive awareness in our organizations and provide the leadership required to implement the cybersecurity measures necessary to protect our networks.

Michael Thomas:

Unfortunately, cyberrisk is part of the landscape that business leaders have to navigate, and trends keep going in the wrong direction. Due to continual technology advancements and increased utilization of third-party platforms, achieving a 100% risk-free posture is not possible. What is possible is for organizations to develop a cybersecurity plan and to have the discipline to test, adjust and improve it as an ongoing business improvement process.

One of the most overlooked, yet most critical, aspects of a cybersecurity plan is around training and testing employees. It is hands down the best investment an organization can make and if properly managed can cut in half the overall threat risk to an organization. Beyond training, we are seeing a big increase in enterprises adopting endpoint detection & response and multi-factor authentication services, both of which are extremely effective at reducing overall cyberrisk.

Mike Vance:

Cybercrime is constantly evolving, so it should be no surprise that data breaches are happening with greater frequency and greater impact to organizations. If a system was put in place and hasn’t been monitored or maintained, it should be immediately reviewed.

A solid cybersecurity foundation focuses on securing two major categories: accounts and data. To improve account security, implement multi-factor authentication with centralized account management through use of single sign-on. This approach can reduce the risk of social engineering attacks such as phishing, which has emerged as the most predominant threat to an organization’s accounts. Data is secured through access authorization and authentication as well as data-loss prevention policies incorporating governance and technical controls, mobile device management, and zero-trust methodologies. None of this reduces the need for ongoing monitoring of these controls. Implementing a regular maintenance and security review cycle to audit accounts and data and remediate any oddities or areas of concern is imperative to cybersecurity.

David Whitt:

 Best practices to prevent a cybersecurity attack are not always well-understood throughout an organization. Also, hackers are getting better at what they do. For optimal protection, an organization must first acknowledge that they are potentially vulnerable. Second, it’s important to have qualified personnel on staff or on contract who continually look for innovative ways to negate potential threats.

Finally, visit the IBJ for the entire roundtable discussion. Most importantly, LEAP Managed IT is happy to provide insights and thoughts to the roundtable discussion. Finally, follow us on social media. So you don’t miss out on our Ridiculously Helpful Tips! Click to read the entire article.

Cyber Security and Risk Management

Cyber Security and Risk Management Roundtable

LEAP hosts Cyber Security and Risk Management Roundtable! Undoubtedly the most insightful event of the season.

Join LEAP Managed IT along with experts from the The Thompson Group and James Allen Insurance.

First, we will discuss mitigating Cyber Security risk. Secondly  understanding recourse action.

Thus the  LEAP Cyber Team will lead the roundtable discussion and provide customer hot topics regarding cyber security and protection. Learn about industry standards for risk coverage and protection. Along with understanding necessary coverage and what you truly need to be secure. Our experts will give real life examples of prevention and recovery. They will also share government standards and regulations. We will wrap up with a question and answer session.

Take away advise and a cheat sheet will able be provided.

Click HERE to Register Today!

LEAP Managed IT helps businesses feel confident in their technology. Helping Indianapolis, Carmel, Zionsville and Fishers take control of their IT, solve business problems and end IT frustrations. Hence, leaders like you can focus on growing your business. Lastly our goal is to be Ridiculously Helpful.  Therefore answering your cyber security questions. managing your IT and supporting your business and community. We want to watch you grow.

EDR and more!

Understanding EDR, MFA and other fun terms!

Being a great IT partner means staying ahead of the curve. Knowing how to protect against a threat before it becomes an issue. As cyber crime grows, your IT provide stays at the forefront and helps protect you from threats. Understanding the terms is not easy, you don’t have to be an expert but you do need to know how to protect yourself in case something happens. When was the last time you checked in with your provider? If it has been over six months, it’s time to reach out and ask some vital questions.

In our efforts to continue being Ridiculously Helpful, we developed a Quick Safety Check!

Here is what you need to know:

  • Do you have EDR? Do you know what EDR (End Point Detection and Response) is?
  • Is  Multi Factor Implementation or MFA part of your daily security?
  • Have you or your team completed Cyber Threat Training? Are you confident someone in your office won’t click on “that” link?
  • Do you have Cyber Insurance Compliance?
  • Have you done Cyber Penetration Testing?
  • When was your last Risk Assessment? Is it documented?

If you answer YES to all of these then you can sleep more soundly at night. If you didn’t, call your IT provider. Or better yet, call us.  We can help walk you though the process. First, we will help you understand what you need to know and why. Then we can help develop a plan to get you moving in the right direction.

Being the leader in IT and Managed services in Indianapolis takes work and dedication. Our trusted team of advisors can help you. It’s our job to be Cyber Security Experts and make sure your business is protected.  Reach out to us today! 

 

 

Cyber Security 101 Webinar

Cyber Security 101 Webinar: Join us September 14th!

REGISTER HERE 

While Cyber Security crime has not gone away and unfortunately the bad guys keep getting sneakier, the good news, we know how they operate!

Join us for a Cyber Security 101 Webinar and learn:

  • the tricks of the trade
  • common mistakes
  • how to protect your business and your data from falling into the wrong hands

If you have joined us in the past…great…come again for a refresher and new tips.

This interactive webinar will be led by Cyber experts and LEAP veterans Gary Thomas & Michael Thomas.

Visit leapmanagedit.com to learn more or CLICK HERE TO REGISTER 

Indianapolis Cyber Security 101 Webinar

Join us September 14th for an Indianapolis Cyber Security 101 Webinar!

Click to Register Today 

Cyber Security crime has not gone away and unfortunately the bad guys keep getting sneakier, the good news, we know how they operate!

Join us for an Indianapolis Cyber Security 101 Webinar to learn the tricks of the trade, common mistakes and how to protect your business and your data from falling into the wrong hands.

If you have joined us in the past…great…come again for a refresher and new tips.

This interactive webinar will be led by Cyber experts and LEAP veterans Gary Thomas & Michael Thomas.

Here at Leap, our goal is to be Ridiculously Helpful to you, regardless of the problem at hand. We want to be your partner– who you turn to for both IT related problems and non-IT related problems. We’re here for you, which is why we are now providing Ridiculously Helpful Tips for you.

Visit us at leapmanagedit.com!